Количество 13
Количество 13

CVE-2023-25815
In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1. This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It ...

CVE-2023-25815
In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1. This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It ...

CVE-2023-25815
In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1. This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It do

CVE-2023-25815
GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place
CVE-2023-25815
In Git for Windows, the Windows port of Git, no localized messages are ...

BDU:2023-06650
Уязвимость функции gettext() распределенной системы контроля версий Git для Windows, позволяющая нарушителю размещать произвольные сообщения

SUSE-SU-2023:2081-1
Security update for git

SUSE-SU-2023:2062-1
Security update for git

SUSE-SU-2023:2038-2
Security update for git

SUSE-SU-2023:2038-1
Security update for git

RLSA-2023:3246
Important: git security update
ELSA-2023-3246
ELSA-2023-3246: git security update (IMPORTANT)
ELSA-2023-3245
ELSA-2023-3245: git security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-25815 In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1. This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It ... | CVSS3: 3.3 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-25815 In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1. This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It ... | CVSS3: 2.2 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-25815 In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1. This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It do | CVSS3: 3.3 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-25815 GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place | 0% Низкий | около 2 лет назад | |
CVE-2023-25815 In Git for Windows, the Windows port of Git, no localized messages are ... | CVSS3: 3.3 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-06650 Уязвимость функции gettext() распределенной системы контроля версий Git для Windows, позволяющая нарушителю размещать произвольные сообщения | CVSS3: 3.3 | 0% Низкий | около 2 лет назад |
![]() | SUSE-SU-2023:2081-1 Security update for git | около 2 лет назад | ||
![]() | SUSE-SU-2023:2062-1 Security update for git | около 2 лет назад | ||
![]() | SUSE-SU-2023:2038-2 Security update for git | около 2 лет назад | ||
![]() | SUSE-SU-2023:2038-1 Security update for git | около 2 лет назад | ||
![]() | RLSA-2023:3246 Important: git security update | около 2 лет назад | ||
ELSA-2023-3246 ELSA-2023-3246: git security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-3245 ELSA-2023-3245: git security update (IMPORTANT) | около 2 лет назад |
Уязвимостей на страницу